Behavioral task
behavioral1
Sample
2228-210-0x0000000000400000-0x0000000000458000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2228-210-0x0000000000400000-0x0000000000458000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
2228-210-0x0000000000400000-0x0000000000458000-memory.dmp
-
Size
352KB
-
MD5
480e7b75882384255a5e4c1c4b23b6d4
-
SHA1
1ec12873f1170216bedc806325a33c6066c0932a
-
SHA256
d8f436b7c8b6e0a4ba9315119e13691a3c447f1b07cdb4096e1759c7a7c8f4fe
-
SHA512
e0e79f5d30025901e5a8c3b7e6d55eee68f265263ac36897278ef7caa55e0e3997c22d417fd3228820031971120ee7b20c2be8cca7d13c0108e19e46db66427e
-
SSDEEP
6144:MSkBoTqkuRAW0jhkjplgxCQ7zzcpUlFb:VGA6a/2jpuxCMzwq
Malware Config
Extracted
vidar
55.1
517
https://t.me/tg_privatetalk
https://nerdculture.de/@yixehi33
-
profile_id
517
Signatures
-
Vidar family
Files
-
2228-210-0x0000000000400000-0x0000000000458000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE